Skip to content
Company name
  • Solutions
    • Identity Security Developer​
    • Software Supply Chain Security​
    • Zero Trust Security​
    • Cloud Security​
  • Use Cases
    • Secrets Management ​
    • Secure CI/CD Pipelines​
    • Kubernetes Security​
    • Security Automation​
    • CIAM
  • Products
    • Customer Access
    • Secrets Manager
    • Project Anun​
    • Cloud Privilege Security​
    • Endpoint Privilege Security
  • Community
  • Docs & Resources
  • Developer Blog
  • Solutions
    • Identity Security Developer​
    • Software Supply Chain Security​
    • Zero Trust Security​
    • Cloud Security​
  • Use Cases
    • Secrets Management ​
    • Secure CI/CD Pipelines​
    • Kubernetes Security​
    • Security Automation​
    • CIAM
  • Products
    • Customer Access
    • Secrets Manager
    • Project Anun​
    • Cloud Privilege Security​
    • Endpoint Privilege Security
  • Community
  • Docs & Resources
  • Developer Blog

Author: Geri Jennings

Profile picture of Geri Jennings
About Geri Jennings
Geri Jennings, PhD is an Engineering Manager on the Conjur team. She enjoys learning new things, and usually comes out with a blog post when there’s an idea she can’t shake. Follow her on twitter at <a href="https://twitter.com/izgerij">@izgerij</a>.

Posts by Geri Jennings

2019 DevOpsDays Boston Recap

Posted on September 26, 2019 (November 6, 2019)

This week we sent some of our team to DevOpsDays Boston. As usual, the real strength of the event were…

Posted in DevOpsTagged boston, conference, DevOps, devopsdays

On Delivering Quality

Posted on January 24, 2019 (May 16, 2019)

I had the pleasure of recently eating dinner at Kitchen Market, a contemporary fusion restaurant in Tel Aviv’s port Namal….

Posted in Uncategorized

Security Islands

Posted on December 7, 2018 (November 6, 2019)

The last decade has been an exciting time for the tech industry, with the advent of collaborative business practices like…

Posted in Uncategorized

Using Kubernetes Custom Resources to Configure Secretless

Posted on October 1, 2018 (July 1, 2020)

The Default Method – Configuration By File The default method for configuring your Secretless Broker is to provide it with…

Posted in Secretless BrokerTagged secretless Broker

Using Summon to Manage Secrets as You Move From Dev to Prod

Posted on September 19, 2018 (May 16, 2019)

I’ve recently been working with secrets.yml files that point to different secrets for different environments, and I wanted to share…

Posted in Secrets, Security

Should small software teams use Kubernetes?

Posted on August 24, 2018 (July 1, 2019)

Buzz about Kubernetes is everywhere, and plenty of large organizations have adopted it. But what about smaller organizations? Is the…

Posted in Uncategorized

Understanding Conjur Policy

Posted on March 21, 2018 (November 6, 2019)

  If this article is the first time you’re hearing about CyberArk Conjur, you’ll probably want to read some of…

Posted in Uncategorized
  • Solutions
    • Identity Security Developer​
    • Software Supply Chain Security​
    • Zero Trust Security​
    • Cloud Security​
  • Uses Cases
    • Secrets Management ​
    • Secure CI/CD Pipelines​
    • Kubernetes Security​
    • Security Automation​
    • CIAM
  • Developer Community​
    • Developer Security Blog​
    • Developer Newsletter
    • Developer Community Forum​
    • Open-source Projects​
  • Resources
    • Tutorials
    • Docs​
    • YouTube​

Copyright © 2025 CyberArk Software Ltd. All rights reserved. Terms and Conditions | Privacy Policy |